Slides Flashcards
Insider threat
Someone who intentionally misused access to negatively effect network
Insider threat methods
- Plant logic bombs
- Open backdoors
- Steal
- Attack internal resources
Insider threat warning signs
- Greed
- Introvertversion (outside of normal behavior)
- Financial hardship
- Vulnerability of blackmail
- Reduced loyalty to the United States
- Destructive, narcissistic behavior
Insider threat detection and prevention techniques
- Encryption
- Data loss prevention
- Data access monitoring
- Log analysis
- Data redaction
- Data access control
Data/file encryption
Ensures integrity and confidentiality of data
Data Loss Prevention
Protects data be providing information about how data is used
Data Access Monitoring
Identifies who is accessing what
Log Analysis
Can determine abnormal events
Data Redaction
Removing sensitive data from media
What are the types of access control?
- Discretionary access control
- Mandatory access control
- Role-based access control
Discretional Access Control (DAC)
Only those specified by the owner
Mandatory Access Control (MAC)
Decisions made by cental authority
What type of access control is based on what a user does in an organization?
Role-based access control
What is it called when a criminal encrypts data on a computer and demands money for access?
Ransomware
What is one of the fastest growing malware threats?
Ransomware
What are attacks delivered via WiFi, Ethernet, RF, Bluetooth?
Remote direct attacks
What delivers attacks through a legitimate looking website, targets vulnerabilities in the browser and associated software and is an attack of opportunity?
Drive-by attack
What is a focused drive-by attack called?
Watering hole
What is malicious content embedded in a webpage?
IFrame Redirect
What are web-based threats?
- Drive-by attacks
- Watering hole
- IFrame redirect
- Fake login pages
- Browser plug-in and script based exploits
- SQL injection
- SEO poisoning
What is web based code executed locally to deliver enhanced content to users and uses mostly JavaScript and VBscript?
Browser plug-in and script based exploits
What is called when attackers manipulate Search Engine Optimization to put their malicious sites high up in search engineer results, is often times legit website controlled by actor, and is very effective against enterprise networks/users?
SEO poisoning
What is the act of entering false information into a DNS cache in order to redirect to a malicious website?
DNS cache poisoning
What is called when an attacker uses legitimate credentials to move within the network with no need for plain text passwords and uses Windows Server Message Block (SMB) to login with password hash?
Pass-the-hash
What can be a legitimate, existing remote access tool like sysinternals (PSExec) or powershell or illegitimate with legit use often going undetected?
Remote access tools/remote access trojan (RAT)
What is it called when attackers exploit a recently fixed zero-day exploit on systems that have not been remediated?
N-day exploit
China
- Noisiest threat actor
- Rapid economic expansion
- Ineffective mitigation strategies for target countries
- large population/large attack volume
- TTP “Smash and grab”
- Attacks lack sophistication and creativity
North Korea
- Perceives cyber attacks as a means to “level the playing field”
- Commonly uses spear-phishing, watering hole, intel gathering, ransomware
Russia
- Home to many advanced cyber attack security researchers
- TTPs include weaponized email attachments, varied attack patterns, exploits, data exfiltration methods, extremely effective detection evasion, Human Intelligence usage
- Low and slow, in it for the long run
Syria
- Loyal to Syrian President Bashar al-Assad
- Attacks governments, online services, and media perceived as hostile to the Syrian government
What is a group with the ability to be a threat and persist for a long period of time, highly skilled and organized, and many are sponsored?
Advanced Persistent Threats
APT29
- Adaptive and disciplined threat group
- Hides activity on victim’s network, communicating infrequently and in a way that closely resembles legitimate traffic
- Monitors network defender activity to maintain control over systems
- Uses only compromised servers for C2 communication
- Counters attempts to remediate attacks
- Maintains fast malware development cycle, quickly altering tools to hinder detection
‐ Associated Malware (Hammertoss, Uploader, tDiscoverer)
‐ Targets (Western European governments, Foreign policy groups, Other organizations with valuable information for Russia)
APT28
‐ Also known as Tsar Team (FireEye)
- Skilled team of developers and operators collecting intelligence on defense and geopolitical issues
- Likely receives ongoing financial support from Russian government
‐ Associated malware (Chopstick, Sourface)
Gain insider information related to governments, militaries and security organizations
‐ Targets (Georgia and eastern European countries and militaries, North Atlantic Treaty Organization (NATO))
Hacker
- Deeper knowledge and understanding of computer technology
‐ Concerned with subtle details of operating systems, algorithms, and configuration files
‐ Elite few of well trained and highly ambitious people
Patriot Hackers
- Main motives are to aid or support one’s own nation-state in an ongoing real-world conflict or war
‐ Chinese hackers have traditionally been especially inclined toward patriotic hacking
Malware Authors
- Form of specialized black-hat hackers
- Develop original software for antagonistic or criminal purposes
- Usually highly skilled in computer programming and detection evasion
- Malware “creation kits” used as framework to allow custom malware creation
Cyber Militias
- Group of volunteers using cyberattacks to achieve political goal
‐ Utilize common communications channel (E.g. internet forum, social media service)
‐ Do not get any monetary rewards for their services
‐ Members that use cyberspace resources, in legal or illegal ways, as a means of general protest or to promote an expressed ideology or a political agenda
Cyber Hacktivists
- Cyber militias that can, in some sense, be seen as a cyberspace equivalent to Greenpeace activists or other groups carrying out acts civil disobedience
‐ The “Anonymous” collective often seen as archetype of a hacktivist actor - Methods often used by hacktivists include web site defacements, internet resource redirects, denial-of-service attacks, information theft, web site parodies, virtual sit-ins and various forms of cyber-sabotage
Criminal Syndicates
- Eastern Europe and West Africa are most active cybercrime hubs
- Other areas where unemployment rates are high and salaries are low
‐ Usually motivated by money and power
‐ Previously lawful citizens with technical skills turn to cybercrime as means to escape poverty
‐ Potential payout is huge on global scale (estimated $114 billion)
What can be manipulated to route traffic from one country to another?
Border Gateway Protocol
Supply Chain Threat
- Since firmware is loaded into memory before most security applications, it is undetectable by conventional cyber defense mechanisms
‐ Malicious code on firmware persists through system updates/reboots
Who has six HPC systems?
Russia
Who is aggressively pursuing implementations for secure quantum communications protocols?
Chinese
What needs to be included in cyber intelligence reports?
- Adversarial Indicators of Compromise (IOCs)
- Tactics Techniques and Procedures (TTPs)
- Recommended actions/counter attacks
What is generated bi-weekly be the 616th Operations Center?
Cyber Threat Bulletin
Report which uses insights, statistics, and case studies to show how tools and tactics of APT actors evolved since 2014 and includes global and regional threat intelligence on industry trends as well as detailed malware analyses?
Mandiant’s Annual Cyber Threat Report
Worldwide team of security engineers, threat analysts, and researchers who develop a variety of content on the latest threats that impact organizations and end users?
- Symantec’s Annual Threat Report
- Symantec’s Monthly Threat Report
- White papers covering an array of security topics
What government agencies make cyber reports?
- Department of Homeland Security
- United States Computer Emergency Readiness Team
- Department of Defense
- Federal Bureau of Investigation
What government agencies provide reports to the public?
- DHS Publications
- FBI Internet Crime Complaint Center (IC3) Reports
- DHS and FBI Joint Analysis Report (JAR-16-20296A)
What is provided by both the DHS and FBI, provides technical details regarding tools and infrastructure used by Russian civilian and military intelligence services (RIS) to exploit networks and endpoints associated with the US election and a range of US government, political, and private sector entities, referred to as Grizzly Steppe?
JAR-16-20296A
Activities performed consistently on a day-to-day basis to support multiple ongoing operations?
Standard operations
Activities performed in support of an operation guided by a tasking?
Target Operations
What are the five phases used by adversaries?
- Phase 0: Administer – Intent and resource development
- Phase 1: Prepare – Reconnaissance and staging
- Phase 2: Engage – Delivery and exploitation (to include C2)
- Phase 3: Propagate – Internal reconnaissance, lateral movement, and network persistence
- Phase 4: Effect – Exfiltration and attack
What are the two phases of Phase 0: Administer?
- Resource Development
- Tasking
What is it when adversaries conduct research on target networks and/or entities of interest and set up infrastructure and capabilities used during operations?
Phase 1: Prepare
What consists of adversary actions against a target to gain initial access?
Phase 2: Engage
What is guaranteeing ongoing & robust access to victim and propagating & achieving maintained presence on target/network?
Phase 3: Propagate
What is the manipulation, disruption, denial, degradation, or destruction of computer or communication systems called?
Phase 4: Effect
What are the three primary missions in Defensive Cyberspace Operations (DCO)?
- Defend networks, systems and information
- Prepare to defend the United States and its interests against cyberattacks of significant consequence
- Provide integrated cyber capabilities to support military operations and contingency plans
What mission conducts ongoing network defense operations to securely operate the DoDIN, has quick response capabilities, and covers the majority of DoD’s ops in cyberspace?
Defend networks, systems and information
What mission covers direction by POTUS/SECDEF to counter imminent/on-going attacks against US homeland or US interests?
Prepare to defend the United States and its interests against Cyberattacks of Significant Consequence?
What mission is to ensure that the internet remains open, secure, and prosperous and conducting cyber operations to deter or defeat strategic threats in other domains?
Provide integrated cyber capabilities to support military operations and contingency plans